Skip to content

Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise /etc/docker directory ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the /etc/docker directory ownership and group-ownership is correctly set to root. /etc/docker directory contains...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise /etc/docker directory permissions must be set to 755 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the /etc/docker directory permissions are correctly set to 755 or more restrictive. /etc/docker directory contai...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise registry certificate file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that all the registry certificate files (usually found under /etc/docker/certs.d/&lt;registry-name&gt; directory) are ...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise registry certificate file permissions must be set to 444 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that all the registry certificate files (usually found under /etc/docker/certs.d/&lt;registry-name&gt; directory) have...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise TLS certificate authority (CA) certificate file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) is owned and group-owned b...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise TLS certificate authority (CA) certificate file permissions must be set to 444 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the TLS CA certificate file (the file that is passed along with --TLScacert parameter) has permissions of 444 or ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise server certificate file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) is owned and group-ow...
    Rule High Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise daemon.json file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the daemon.json file ownership and group-ownership is correctly set to root. daemon.json file contains sensitive...
    Rule High Severity
  • Docker Enterprise server certificate file permissions must be set to 444 or more restrictive.

    &lt;VulnDiscussion&gt;Verify that the Docker server certificate file (the file that is passed along with --TLScert parameter) has permissions of 44...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Docker Enterprise server certificate key file ownership must be set to root:root.

    &lt;VulnDiscussion&gt;Verify that the Docker server certificate key file (the file that is passed along with --TLSkey parameter) is owned and group...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules